v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Cybersecurity Risk Management and Strategy

The security of our products, services and company networks is our top priority. We recognize the importance of assessing, identifying and managing significant risks associated with cybersecurity threats. These risks include operational risks, intellectual property infringement, fraud, extortion, damage caused to employees, customers, business partners or the public, violations of privacy or security laws and other litigation and legal risks and reputational risks.

We attach great importance to our customer data and have implemented cybersecurity policies throughout our operations, including standardizing product quality through security reviews before prioritizing cybersecurity into design throughout the product and service lifecycle. Security departments combine external research and intelligence gathering to keep the company informed of new and evolving cyber risks.

We have implemented various cybersecurity processes, technologies and controls to help us assess, identify and manage significant risks imposed by cybersecurity threats and to protect, detect and respond to cybersecurity incidents. The measures we have taken include:

The formation of an Information Security Committee principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents.
The security department implements cybersecurity policies based on the company’s development needs and legal requirements. These policies include, but not limited to, the Information Security Management Strategy, Risk Assessment Management Measures, Network Security Management Measures, and Network and Information Security Incident Emergency Response Process and Plans.
All company employees are required to complete annual comprehensive information security trainings, and R&D personnels are required to complete annual security coding training. Monthly information security tips are sent to all employees via email and instant messaging tools, which includes highlighted specific threats and scenarios identified based on our analysis of current organizational risks.
The security department establishes a standardized security operation system, which includes monitoring the security of host systems through intrusion detection systems and file change management systems. Automated black-box vulnerability scanning and white-box code scanning are conducted through scanning softwares. Advanced web application firewalls are employed to block attacks. Alerts are identified and addressed on a daily basis.
Every year, based on our network security incident response plan, we strengthen internal cross-functional coordination and implement security incident drills to strengthen security incident management; and the DBA (“Database Administrator”) and operation and maintenance teams regularly perform disaster recovery drills.
The security department conducts an annual assessment of information security risks and notifies the Information Security Committee. External consultants are hired to conduct regular penetration testing and participate in red teaming exercises. The security department drives the closure of internal risk-related issues.

These measures demonstrate our commitment to ensuring the security of our products, services, and company networks, as well as protecting the confidentiality, integrity, and availability of our customer data. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, including our operations, business strategy, results of operations, or financial condition. We face risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. See “Item 3. Key Information—D. Risk Factors — Risks Relating to Our Business — Cybersecurity incidents, including data security breaches or computer viruses, could harm our business by disrupting our delivery of services, damaging our reputation or exposing us to liability.”

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

We have implemented various cybersecurity processes, technologies and controls to help us assess, identify and manage significant risks imposed by cybersecurity threats and to protect, detect and respond to cybersecurity incidents. The measures we have taken include:

The formation of an Information Security Committee principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents.
The security department implements cybersecurity policies based on the company’s development needs and legal requirements. These policies include, but not limited to, the Information Security Management Strategy, Risk Assessment Management Measures, Network Security Management Measures, and Network and Information Security Incident Emergency Response Process and Plans.
All company employees are required to complete annual comprehensive information security trainings, and R&D personnels are required to complete annual security coding training. Monthly information security tips are sent to all employees via email and instant messaging tools, which includes highlighted specific threats and scenarios identified based on our analysis of current organizational risks.
The security department establishes a standardized security operation system, which includes monitoring the security of host systems through intrusion detection systems and file change management systems. Automated black-box vulnerability scanning and white-box code scanning are conducted through scanning softwares. Advanced web application firewalls are employed to block attacks. Alerts are identified and addressed on a daily basis.
Every year, based on our network security incident response plan, we strengthen internal cross-functional coordination and implement security incident drills to strengthen security incident management; and the DBA (“Database Administrator”) and operation and maintenance teams regularly perform disaster recovery drills.
The security department conducts an annual assessment of information security risks and notifies the Information Security Committee. External consultants are hired to conduct regular penetration testing and participate in red teaming exercises. The security department drives the closure of internal risk-related issues.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity is an important part of our risk management processes and an area of focus for our board of directors and management. Accordingly, an Information Security Committee has been formed to enhance organizational coordination and standardized information security practices of the Company.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Information Security Committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors receives regular reports from management on our cybersecurity risks. In addition, management updates our board of directors, as necessary, regarding any significant cybersecurity incidents.Our board of directors also receives briefings from management on our cyber risk management system.
Cybersecurity Risk Role of Management [Text Block]

Our management oversees efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in our IT Systems environment.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Chief Technology Officer serves as the committee chairman, and members include leaders from R&D and Digital Marketing Center such as Product Department, R&D Department, Operations Department, Database Administrator Department, Security Department.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Meetings are held on the 14th of every month to discuss significant security projects. The Operations Director reports the progress of information security work to the Chief Technology Officer every two weeks via email, and the PMO (“Project management officer”) discusses major security projects weekly via email.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true